2006 2 nd Joint Workshop between Security Research Labs in JAPAN and KOREA Profile-based Web Application Security System 2006-2-20 Kyungtae Kim High Performance.

Slides:



Advertisements
Similar presentations
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
Advertisements

Part 2 Authors: Marco Cova, et al. Presented by Brett Parker.
By Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna Network and Distributed System Security(NDSS ‘07)
Automating Bespoke Attack Ruei-Jiun Chapter 13. Outline Uses of bespoke automation ◦ Enumerating identifiers ◦ Harvesting data ◦ Web application fuzzing.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Profile-Based Web Intrusion Prevention System by Donovan Thorpe CS526 Fall 2002.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November.
Introduction to the OWASP Top 10. Cross Site Scripting (XSS)  Comes in several flavors:  Stored  Reflective  DOM-Based.
Dec 13 th CS555 presentation1 Yiwen Wang --“Securing the DB may be the single biggest action an organization can take to protect its assets” David C. Knox.
CROSS SITE SCRIPTING..! (XSS). Overview What is XSS? Types of XSS Real world Example Impact of XSS How to protect against XSS?
Leveraging User Interactions for In-Depth Testing of Web Application Sean McAllister Secure System Lab, Technical University Vienna, Austria Engin Kirda.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Comp2513 Forms and CGI Server Applications Daniel L. Silver, Ph.D.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
A Framework for Automated Web Application Security Evaluation
Web Application Access to Databases. Logistics Test 2: May 1 st (24 hours) Extra office hours: Friday 2:30 – 4:00 pm Tuesday May 5 th – you can review.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
TCP/IP Malicious Packet Detection (SQL Injection Detection) Ashok Parchuri.
A Security Review Process for Existing Software Applications
Computer Security and Penetration Testing
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Chapter 8 Cookies And Security JavaScript, Third Edition.
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Analysis of SQL injection prevention using a filtering proxy server By: David Rowe Supervisor: Barry Irwin.
Beyond negative security Signatures are not always enough Or Katz Trustwave ot.com/
1 Swaddler: An Approach for the Anomaly-based Detection of State Violations in Web Application Marco Cova, Davide Balzarotti, Viktoria Felmetsger, and.
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Marking Scheme for Semantic- aware Web Application Security HPC.
Aniket Joshi Justin Thomas. Agenda Introduction to SQL Injection SQL Injection Attack SQL Injection Prevention Summary.
Middleware Vulnerabilities Damian Tamayo Kansas State University MSE 2 nd Semester.
Cross Site Scripting and its Issues By Odion Oisamoje.
Module 7: Advanced Application and Web Filtering.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Polymorphic Worm Detection by Instruction Distribution Kihun Lee HPC Lab., Postech.
Security Issues with PHP  PHP installation  PHP programming Willa Zhu & Eugene Burger.
 Previous lessons have focused on client-side scripts  Programs embedded in the page’s HTML code  Can also execute scripts on the server  Server-side.
INTRODUCTION Firewall is a concept which blocks unwanted traffic and passes desirable traffic to and from both sides of the network.
What Is XSS ? ! Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Effective Anomaly Detection with Scarce Training Data Presenter: 葉倚任 Author: W. Robertson, F. Maggi, C. Kruegel and G. Vigna NDSS
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic,
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
SQL INJECTION Lecturer: A.Prof.Dr. DANG TRAN KHANH Student :Le Nguyen Truong Giang.
Anomaly Detection of Web- based Attacks Kruegel, C. and Vigna, G. University of California, Santa Barbara The 10th ACM Conference on Computer and Communication.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Memory Protection through Dynamic Access Control Kun Zhang, Tao Zhang and Santosh Pande College of Computing Georgia Institute of Technology.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
Database and Cloud Security
CSCE 548 Student Presentation Ryan Labrador
An Introduction to Web Application Security
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Static Detection of Cross-Site Scripting Vulnerabilities
A Security Review Process for Existing Software Applications
Marking Scheme for Semantic-aware Web Application Security
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
Detecting Targeted Attacks Using Shadow Honeypots
CS5123 Software Validation and Quality Assurance
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

nd Joint Workshop between Security Research Labs in JAPAN and KOREA Profile-based Web Application Security System Kyungtae Kim High Performance Computing Lab at Postech 2 nd Joint Workshop between Security Research Labs in Korea and Japan

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 2/17 Contents  Introduction  Related Works Application-Level Web Security Policies Anomaly Detection of Web-based Attacks  Problem Definition  Proposed Idea Dynamic Model Organization Detection Models Applying Methods  Conclusion & Future Works

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 3/17 Introduction  Application-level web attack Uses vulnerabilities in the code of a web applicati on. Can’t be covered by traditional method.  Unvalidated input : Most critical vulnerability Cross Site Scripting (XSS) : Attacker uses trusted application/company to reflect malicious code to end-user. Buffer Overflows : Attacker attempts to store more data in a buffer than there is memory allocated for it Injection Attacks : Attacker relays malicious code in form variables or URL.

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 4/17 [1] Policy-based Web Application Firewall * Related Works (1/3) * David Scott and Richard Sharp,“Specifying and Enforcing Application-Level Web Security Policies”, 2003 IEEE Specifies the policy Translates the SPDL into server-side code Filters the HTTP messages between the web-server and client Automates the policy creation (not fully automated)  Policy : defining validation rules (length, type, etc.)

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 5/17  Anomaly detection method profile-based using positive models (models for normal behavior)  Operation of positive models Training phase : determining the characteristics of normal events Detection phase : assessing the anomaly of a event, reporting anomalous events [2] Multi-model Approach * (1/2) Related Works (2/3) * Christopher Kruegel, Giovanni Vigna, “A multi-model approach to the detection of web- based attacks”, 2005

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 6/17  Multi-model Widening the coverage of detection Preventing attacker’s manipulation avoiding specific model  Detection models Attribute Length Attribute Character Distribution Structural Inference Token Finder Attribute Presence or Absence Attribute Order  Anomaly score (for each attribute) Derived from the probability values returned by the models  [2] Multi-model Approach (2/2) Related Works (3/3)

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 7/17 Problem Definition  Shortcomings of Related Works [1]Policy-based  Not automated method  Too simple policy [2] Multi-model Approach  Applying all models to all attributes  Low speed  Ignoring each attribute’s characteristics  Problem Definition Proposing new application-level web security system that uses automated method and operates on real time.

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 8/17 Web Server Web Application DB User Application-level firewall (Filtering GET, POST request) System Overview  Method: profile-based anomaly detection  Target : application-level web attack (especially, input manipulation)  Goal : high speed, low false positive rate  Operation : application-level firewall on server’s gateway Proposed Idea (1/8) Server’s Gateway

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 9/17 Dynamic Model Organization - Necessity  Each attribute has its own characteristics.  Some model can disturb the division of normal/ abnormal value of specific attribute. ex> User ID has dynamic character distribution, and some normal values are misjudged to anomaly. (‘aaaa’ vs ‘ ’)  On most of the attributes, small set of models are important for detection. Deciding set of models in advance  Faster detection Proposed Idea (2/8)

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 10/17  Training phase Making statistics of each attribute of each URL Determining model sets based on the statistics  Detection phase Finding statistics and model set for the URL, and applying that models Length, Character Composition Value Range Length, Token Finder Length, Character Distribution Length, Character Composition, Structural Inference Dynamic Model Organization - Method statistics(profile)Model sets len μlen σ… URL1attribute1 attribute2 attribute3 URL2attribute1 attribute2 Proposed Idea (3/8) Target URL : URL1?attribute1=value1&attribute2=value2&… Applying length and character composition model Applying value range model

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 11/17 Detection Models (1/2)  Length (similar with [2])  Character Distribution (similar with [2])  Structural Inference (similar with [2])  Token Finder (similar with [2])  Character Composition  Value Range Proposed Idea (4/8)

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 12/17 Detection Models (2/2)  Character Composition Training phase  Measuring normal frequency of each set  Deciding the expected type of each attribute Detection phase  Calculating probability of deviation from normal frequency  Using chi-square test( )  Value range Applying when the expected type is integer Checking the attribute ’ s range of values Part(0)Part(1)Part(2)Part(3)Part(4) NumberAlphabet Special Character UnprintableOthers 0~9A~Z a~z. / ; … Proposed Idea (5/8)

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 13/17 Applying Methods (1/3)  Length Enabled to all string attribute.  Token Finder Enabled when the attribute is composed with small set of tokens.  Character Composition Disabled when token finder model is enabled or there are too many special characters and unprintable characters. Proposed Idea (6/8)

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 14/17 Applying Methods (2/3)  Value range Enabled when the expected type is number.  Character Distribution Enabled when token finder model is disabled and the attribute allows special character and the mean of length is larger than threshold.  Structural Inference Enabled when the number of states are less than threshold. Enabled when the length is dynamic and token finder model is disabled and the attribute allows special character. Proposed Idea (7/8)

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 15/17 Applying Methods (3/3)  Training phase Profiling value of each attribute of each URL Determining each attribute ’ s model set  Detection phase Calculating each model ’ s probability of abnormality Multiplying the probability and making anomaly score Filtering, modifying or passing the request according to anomaly score Proposed Idea (8/8)

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 16/17 Conclusion & Future Works  Unvalidated input is web application’s most critical vulnerability.  Policy-based or signature-based systems are not automated methods, and multi- model based anomaly detection can’t operate on real time.  I introduced profile-based web application security system that gets high speed with dynamic model organization.  Future works are optimizing and evaluating my system.

nd Joint Workshop between Security Research Labs in JAPAN and KOREA 17/17 Thank you! Q & A